1 | 4 | ||||||||||||||||||||
2 | |||||||||||||||||||||
3 | |||||||||||||||||||||
1. A type of malware that disguises itself as a legitimate program but performs malicious activities in the background.
2. A software program designed to detect, prevent, and remove computer viruses and other malicious software.
3. A type of malicious software that can replicate itself and spread to other computers.
4. A type of malware that encrypts files on a victim's computer and demands a ransom in exchange for the decryption key.